Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Infection happened - what now?

    Scheduled Pinned Locked Moved General pfSense Questions
    14 Posts 8 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      Are you asking how if anything pfsense could be used to prevent such an infection, or what pfsense could do to alert you to an infected pc, or how you could then isolate it from the rest of your network if you find an infected pc?

      Pfsense is a network firewall/router - it has really no control over what a user does with the client OS..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        You can use ClamAV in Squid but unless you're doing full SSL intercept it's close to worthless at this point IMO.

        You can run Snort or Suricata and that can detect and block traffic to/from malware. No guarantees though.

        Steve

        1 Reply Last reply Reply Quote 1
        • bmeeksB
          bmeeks
          last edited by bmeeks

          As others have stated, nothing can be guaranteed in the world of computer security. That's especially true of client PCs. Users can be incredibly naive about such things. Some will double-click on everything everywhere! And any warning dialogs asking "are you sure" should always be answered with "hell yeah!" ... ☺ .

          The best protection is keeping all your client devices up to date with security hotfixes and also, where possible, limiting users ability to shoot themselves in the foot by not granting them administrator or root-equivalent permissions on the machine.

          Tools such as anti-virus scanners on clients and IDS/IPS platforms like Snort or Suricata on the network pathway can help, but they are not foolproof. And tools such as Snort and Suricata require highly skilled administrators to correctly configure them and monitor the alerts they generate.

          provelsP 1 Reply Last reply Reply Quote 0
          • Raffi_R
            Raffi_
            last edited by

            Come up with a layered approach to security. pfSense is perfect for that.

            • The firewall rules should be restrictive but not counterproductive.
            • IDS/IPS is another layer that'll help block malicious traffic.
            • As mentioned, ClamAV could be another layer, but you'd have to intercept HTTPS and essentially break encryption just for that purpose. Not personally a fan of this.
            • PfBlocker is another layer and in my opinion is almost a must. Being able to block Ads and known malicious sites is a huge plus. Ads are sometimes trying to take your users to faked sites. That is a major avenue of attack for viruses and phishing.

            When you do run into a problem,

            • Find the client with the problem ASAP and remove it from the network.
            • Once you understand the issue with the first client, you can then figure out if any others were impacted.

            In general, I find that the biggest problem for security on my network comes from dealing with the people using the computers and their emails. pfSense is not going to be as helpful with that, but could help limit chances of issues if configured well with layered security. Maybe we need a pfSense package which lets admins send out quick training seminars to the users, including me :)

            JKnottJ 1 Reply Last reply Reply Quote 1
            • provelsP
              provels @bmeeks
              last edited by

              @bmeeks said in Infection happened - what now?:

              And any warning dialogs asking "are you sure" should always be answered with "hell yeah!" ... ☺ .

              🤣

              Peder

              MAIN - pfSense+ 24.11-RELEASE - Adlink MXE-5401, i7, 16 GB RAM, 64 GB SSD. 500 GB HDD for SyslogNG
              BACKUP - pfSense+ 23.01-RELEASE - Hyper-V Virtual Machine, Gen 1, 2 v-CPUs, 3 GB RAM, 8GB VHDX (Dynamic)

              1 Reply Last reply Reply Quote 0
              • S
                Sessa45 @stephenw10
                last edited by

                Hi Guys! Thank you so much for your answers!

                @stephenw10 said in Infection happened - what now?:

                Keep a backup of the config file locally. Use the Auto Config Backup to make sure you always have the latest config backed up.

                I already configured a cronjob which makes a backup of the config.xml and copy them to an server.

                @JKnott said in Infection happened - what now?:

                One thing to remember is pfSense is based on FreeBSD and viruses tend to be written for Windows.

                Very true.

                @johnpoz said in Infection happened - what now?:

                Are you asking how if anything pfsense could be used to prevent such an infection, or what pfsense could do to alert you to an infected pc, or how you could then isolate it from the rest of your network if you find an infected pc?
                Pfsense is a network firewall/router - it has really no control over what a user does with the client OS..

                Basically, I have to know how to deal with an infected PC / network.
                I have already read that I can create something like LAN segments, which I can probably then individually control. For example subdivisions into the segments "Purchasing", "Administration", "Management", etc.
                So i need to know the following points:

                what pfsense could do to alert you to an infected pc

                how you could then isolate it from the rest of your network

                @Raffi_ said in Infection happened - what now?:

                When you do run into a problem,

                Find the client with the problem ASAP and remove it from the network.

                But how can i find the client? I think, to analyse the traffic is the only way to do this?

                @Raffi_ said in Infection happened - what now?:

                Maybe we need a pfSense package which lets admins send out quick training seminars to the users, including me :)

                Nice idea ;)

                I use a well-configured set of rules. I also use Snort as an IDS component with the Community Subscriber Edition.
                The pfBlockerNG is also in use with a few lists and the geographical blockade.
                Last but not least I use the DNSBL to block some more sites (like Microsoft Spyware).

                Raffi_R 1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Exporting the logs, including Snort logs, to some external analyser is useful. That can then alert you to some internal machine triggering stuff before you might otherwise find it.

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • Raffi_R
                    Raffi_ @Sessa45
                    last edited by

                    @Sessa45 said in Infection happened - what now?:

                    But how can i find the client? I think, to analyse the traffic is the only way to do this?

                    You may have a client come to you saying my PC is doing weird things. That's one indicator :)

                    @stephenw10 said in Infection happened - what now?:

                    Exporting the logs, including Snort logs, to some external analyser is useful. That can then alert you to some internal machine triggering stuff before you might otherwise find it.

                    Steve

                    I'm interested to know what people are using to analyze and alert on log entries in terms of potential security risks. I have mine going to a syslog server, but I have to manually look through it. My eyes are not calibrated to find potential security risks in the log.

                    bmeeksB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @Raffi_
                      last edited by

                      @Raffi_ said in Infection happened - what now?:

                      I'm interested to know what people are using to analyze and alert on log entries in terms of potential security risks. I have mine going to a syslog server, but I have to manually look through it. My eyes are not calibrated to find potential security risks in the log.

                      I'm not sure there is a free and open-source product out there that matches the capabilities of a tool such as ArcSight. That tool lets you create "use cases" which incorporate a lot of almost "artificial intelligence type" decision trees. You can have it look for and analyze patterns of log entries and then, when all of the various decision conditions are met, ArcSight itself will raise an alert to get a human's attention. The human then performs a more detailed analysis of the findings. I used ArcSight in my old job before retirement. Very capable but also quite expensive to own and operate.

                      Maybe there is an open-source alternative out there. The only open-source tool I have direct experience with is Snorby, and it was definitely not as powerful as ArcSight.

                      1 Reply Last reply Reply Quote 1
                      • JKnottJ
                        JKnott @Raffi_
                        last edited by

                        @Raffi_ said in Infection happened - what now?:

                        Find the client with the problem ASAP and remove it them from the network. 😉

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.